Malicious Hackers: A Framework for Analysis and Case Study - Laura J Kleen - Books - Biblioscholar - 9781249600732 - October 10, 2012
In case cover and title do not match, the title is correct

Malicious Hackers: A Framework for Analysis and Case Study

Price
Íkr 3,459
excl. VAT

Ordered from remote warehouse

Expected delivery May 27 - Jun 9
Add to your iMusic wish list

Publisher Marketing: Recent years have seen an increase in the number and severity of Information Operations (IO) attacks upon DoD resources. At a higher level, the US as a whole has come under cyber attack by individuals and groups seeking thrills, monetary gain, publicity for their causes, and myriad other goals. This effort develops a first cut model of individual hacker mentality that can be utilized to improve threat assessment, mitigate Information Assurance (IA) vulnerabilities, and improve risk assessment. Further, it is a first step toward automated characterization of Information Warfare (IW) attacks based upon hacker types. All hackers are not the same. In order to best deal with their actions and the intent behind their actions, one must understand who they are. Many hackers are not malicious, in that they hack for the thrill of learning and to "look around." However, others are intent upon gathering information for gain (profit or intelligence aspects), corrupting data or denying access to the system, or to see what harm they can cause. Research for this effort specifically focused on malicious hackers working for nation states, although the basic framework presented applies in part to any type of hacker. This results in advances in the way that hackers are classified and profiled, with a better understanding of their values, skills, and approaches to hacking. Responses can then be tailored to specifics of a given class of hackers.

Media Books     Paperback Book   (Book with soft cover and glued back)
Released October 10, 2012
ISBN13 9781249600732
Publishers Biblioscholar
Pages 224
Dimensions 189 × 246 × 12 mm   ·   317 g